Skip to main content

2020 | OriginalPaper | Buchkapitel

6. Review of Game Theory

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Theoretic models, such as game-theoretic model, Markov decision processes, linear and non-linear dynamic models, etc., at the system level, play a significant role in Cyber-Physical Systems (CPSs). These models stand as a scientific basis for high-level, security-related decision making. Game theory provides mathematical tools and models for investigating multi-person strategic decision making, where the players or decision-makers compete for limited and shared resources (Manshaei et al., ACM Comput Surv 45(3):25, 2013). Considering the security issues in CPSs, we can view the defenders and attackers as two types of players, who fight for specific resources. Therefore, we use game models to describe the interactions between them. The analytical results based on the game models can assist us in finding the optimal defense strategy. In this chapter, we briefly review specific game theory models, including zero-sum games, Stackelberg games, and FlipIt game. These models are closely related to our applications.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
10.
Zurück zum Zitat S. Backhaus, R. Bent, J. Bono, R. Lee, B. Tracey, D. Wolpert, D. Xie, Y. Yildiz, Cyber-physical security: a game theory model of humans interacting over control systems. IEEE Trans. Smart Grid 4(4), 2320–2327 (2013) S. Backhaus, R. Bent, J. Bono, R. Lee, B. Tracey, D. Wolpert, D. Xie, Y. Yildiz, Cyber-physical security: a game theory model of humans interacting over control systems. IEEE Trans. Smart Grid 4(4), 2320–2327 (2013)
11.
Zurück zum Zitat T. Başar, P. Bernhard, H-infinity Optimal Control and Related Minimax Design Problems: A Dynamic Game Approach (Springer Science & Business Media, Berlin/Heidelberg, 2008), pp. 3084–3089 T. Başar, P. Bernhard, H-infinity Optimal Control and Related Minimax Design Problems: A Dynamic Game Approach (Springer Science & Business Media, Berlin/Heidelberg, 2008), pp. 3084–3089
13.
Zurück zum Zitat T. Basar, G.J. Olsder, Dynamic Noncooperative Game Theory, vol. 23 (SIAM, Philadelphia, PA, 1999)MATH T. Basar, G.J. Olsder, Dynamic Noncooperative Game Theory, vol. 23 (SIAM, Philadelphia, PA, 1999)MATH
30.
Zurück zum Zitat J. Chen, Q. Zhu, Interdependent network formation games with an application to critical infrastructures, in 2016 American Control Conference (ACC), pp. 2870–2875 (IEEE, New York, 2016) J. Chen, Q. Zhu, Interdependent network formation games with an application to critical infrastructures, in 2016 American Control Conference (ACC), pp. 2870–2875 (IEEE, New York, 2016)
33.
Zurück zum Zitat J. Chen, C. Touati, Q. Zhu, Heterogeneous multi-layer adversarial network design for the IoT-enabled infrastructures, in GLOBECOM 2017-2017 IEEE Global Communications Conference (IEEE, New York, 2017), pp. 1–6 J. Chen, C. Touati, Q. Zhu, Heterogeneous multi-layer adversarial network design for the IoT-enabled infrastructures, in GLOBECOM 2017-2017 IEEE Global Communications Conference (IEEE, New York, 2017), pp. 1–6
63.
Zurück zum Zitat L. Huang, Q. Zhu, Analysis and computation of adaptive defense strategies against advanced persistent threats for cyber-physical systems, in International Conference on Decision and Game Theory for Security (Springer, New York, 2018), pp. 205–226 L. Huang, Q. Zhu, Analysis and computation of adaptive defense strategies against advanced persistent threats for cyber-physical systems, in International Conference on Decision and Game Theory for Security (Springer, New York, 2018), pp. 205–226
64.
Zurück zum Zitat L. Huang, Q. Zhu, Adaptive strategic cyber defense for advanced persistent threats in critical infrastructure networks. ACM SIGMETRICS Perform. Eval. Rev. 46(2), 52–56 (2019) L. Huang, Q. Zhu, Adaptive strategic cyber defense for advanced persistent threats in critical infrastructure networks. ACM SIGMETRICS Perform. Eval. Rev. 46(2), 52–56 (2019)
65.
Zurück zum Zitat L. Huang, Q. Zhu, Dynamic bayesian games for adversarial and defensive cyber deception, in Autonomous Cyber Deception (Springer, New York, 2019), pp. 75–97 L. Huang, Q. Zhu, Dynamic bayesian games for adversarial and defensive cyber deception, in Autonomous Cyber Deception (Springer, New York, 2019), pp. 75–97
94.
Zurück zum Zitat Y. Li, L. Shi, P. Cheng, J. Chen, D.E. Quevedo, Jamming attacks on remote state estimation in cyber-physical systems: a game-theoretic approach. IEEE Trans. Autom. Control 60(10), 2831–2836 (2015)MathSciNetMATH Y. Li, L. Shi, P. Cheng, J. Chen, D.E. Quevedo, Jamming attacks on remote state estimation in cyber-physical systems: a game-theoretic approach. IEEE Trans. Autom. Control 60(10), 2831–2836 (2015)MathSciNetMATH
114.
Zurück zum Zitat O. Morgenstern, J. Von Neumann, Theory of Games and Economic Behavior (Princeton University Press, Princeton, 1953)MATH O. Morgenstern, J. Von Neumann, Theory of Games and Economic Behavior (Princeton University Press, Princeton, 1953)MATH
128.
Zurück zum Zitat J. Pawlick, E. Colbert, Q. Zhu, Modeling and analysis of leaky deception using signaling games with evidence. IEEE Trans. Inf. Foren. Secur. 14(7), 1871–1886 (2018) J. Pawlick, E. Colbert, Q. Zhu, Modeling and analysis of leaky deception using signaling games with evidence. IEEE Trans. Inf. Foren. Secur. 14(7), 1871–1886 (2018)
129.
Zurück zum Zitat J. Pawlick, E. Colbert, Q. Zhu, A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy. ACM Comput. Surv. 52(4), 1–28 (2019) J. Pawlick, E. Colbert, Q. Zhu, A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy. ACM Comput. Surv. 52(4), 1–28 (2019)
157.
Zurück zum Zitat J.B. Song, Q. Zhu, Performance of dynamic secure routing game, in Game Theory for Networking Applications (Springer, New York, 2019), pp. 37–56 J.B. Song, Q. Zhu, Performance of dynamic secure routing game, in Game Theory for Networking Applications (Springer, New York, 2019), pp. 37–56
167.
Zurück zum Zitat M. Van Dijk, A. Juels, A. Oprea, R.L. Rivest, Flipit: The game of stealthy takeover. J. Cryptol. 26(4), 655–713 (2013)MathSciNetMATH M. Van Dijk, A. Juels, A. Oprea, R.L. Rivest, Flipit: The game of stealthy takeover. J. Cryptol. 26(4), 655–713 (2013)MathSciNetMATH
169.
Zurück zum Zitat H. Von Stackelberg, Market Structure and Equilibrium (Springer Science & Business Media, Berlin/Heidelberg, 2010) H. Von Stackelberg, Market Structure and Equilibrium (Springer Science & Business Media, Berlin/Heidelberg, 2010)
174.
Zurück zum Zitat Z. Xu, A. Easwaran, A game-theoretic approach to secure estimation and control for cyber-physical systems with a digital twin, in 2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS) (IEEE, New York, 2020), pp. 20–29 Z. Xu, A. Easwaran, A game-theoretic approach to secure estimation and control for cyber-physical systems with a digital twin, in 2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS) (IEEE, New York, 2020), pp. 20–29
189.
Zurück zum Zitat R. Zhang, Q. Zhu, A game-theoretic defense against data poisoning attacks in distributed support vector machines, in 2017 IEEE 56th Annual Conference on Decision and Control (CDC) (IEEE, New York, 2017), pp. 4582–4587 R. Zhang, Q. Zhu, A game-theoretic defense against data poisoning attacks in distributed support vector machines, in 2017 IEEE 56th Annual Conference on Decision and Control (CDC) (IEEE, New York, 2017), pp. 4582–4587
193.
Zurück zum Zitat R. Zhang, Q. Zhu, A game-theoretic approach to design secure and resilient distributed support vector machines. IEEE Trans. Neural Netw. Learn. Syst. 29(11), 5512–5527 (2018)MathSciNet R. Zhang, Q. Zhu, A game-theoretic approach to design secure and resilient distributed support vector machines. IEEE Trans. Neural Netw. Learn. Syst. 29(11), 5512–5527 (2018)MathSciNet
197.
Zurück zum Zitat T. Zhang, L. Huang, J. Pawlick, Q. Zhu, Game-theoretic analysis of cyber deception: evidence-based strategies and dynamic risk mitigation, in Modeling and Design of Secure Internet of Things (Wiley, New York, 2020), pp. 27–58 T. Zhang, L. Huang, J. Pawlick, Q. Zhu, Game-theoretic analysis of cyber deception: evidence-based strategies and dynamic risk mitigation, in Modeling and Design of Secure Internet of Things (Wiley, New York, 2020), pp. 27–58
200.
Zurück zum Zitat Q. Zhu, T. Başar, Dynamic policy-based IDS configuration, in Proceedings of the 48h IEEE Conference on Decision and Control (CDC) Held Jointly with 2009 28th Chinese Control Conference (IEEE, New York, 2009), pp. 8600–8605 Q. Zhu, T. Başar, Dynamic policy-based IDS configuration, in Proceedings of the 48h IEEE Conference on Decision and Control (CDC) Held Jointly with 2009 28th Chinese Control Conference (IEEE, New York, 2009), pp. 8600–8605
201.
Zurück zum Zitat Q. Zhu, T. Başar, Robust and resilient control design for cyber-physical systems with an application to power systems, in 2011 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC) (IEEE, New York, 2011), pp. 4066–4071 Q. Zhu, T. Başar, Robust and resilient control design for cyber-physical systems with an application to power systems, in 2011 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC) (IEEE, New York, 2011), pp. 4066–4071
203.
Zurück zum Zitat Q. Zhu, T. Başar, Game-theoretic approach to feedback-driven multi-stage moving target defense, in International Conference on Decision and Game Theory for Security (Springer, New York, 2013), pp. 246–263MATH Q. Zhu, T. Başar, Game-theoretic approach to feedback-driven multi-stage moving target defense, in International Conference on Decision and Game Theory for Security (Springer, New York, 2013), pp. 246–263MATH
206.
Zurück zum Zitat Q. Zhu, S. Rass, On multi-phase and multi-stage game-theoretic modeling of advanced persistent threats. IEEE Access 6, 13958–13971 (2018) Q. Zhu, S. Rass, On multi-phase and multi-stage game-theoretic modeling of advanced persistent threats. IEEE Access 6, 13958–13971 (2018)
208.
Zurück zum Zitat Q. Zhu, H. Tembine, T. Başar, Network security configurations: a nonzero-sum stochastic game approach, in Proceedings of the 2010 American Control Conference (IEEE, New York, 2010), pp. 1059–1064 Q. Zhu, H. Tembine, T. Başar, Network security configurations: a nonzero-sum stochastic game approach, in Proceedings of the 2010 American Control Conference (IEEE, New York, 2010), pp. 1059–1064
209.
Zurück zum Zitat Q. Zhu, W. Saad, Z. Han, H.V. Poor, T. Başar, Eavesdropping and jamming in next-generation wireless networks: a game-theoretic approach, in 2011-MILCOM 2011 Military Communications Conference (IEEE, New York, 2011), pp. 119–124 Q. Zhu, W. Saad, Z. Han, H.V. Poor, T. Başar, Eavesdropping and jamming in next-generation wireless networks: a game-theoretic approach, in 2011-MILCOM 2011 Military Communications Conference (IEEE, New York, 2011), pp. 119–124
212.
Zurück zum Zitat Q. Zhu, Z. Yuan, J.B. Song, Z. Han, T. Basar, Interference aware routing game for cognitive radio multi-hop networks. IEEE J. Sel. Areas Commun. 30(10), 2006–2015 (2012) Q. Zhu, Z. Yuan, J.B. Song, Z. Han, T. Basar, Interference aware routing game for cognitive radio multi-hop networks. IEEE J. Sel. Areas Commun. 30(10), 2006–2015 (2012)
Metadaten
Titel
Review of Game Theory
verfasst von
Quanyan Zhu
Zhiheng Xu
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-60251-2_6